Sr. Google SecOps Engineer dedicated to onboarding and maintaining Sec Ops environments for Optiv clients. Collaborating in a 24x7 Security Operations Center to provide critical services.
Responsibilities
Serve as a primary responder for AFC customer systems, taking ownership of client configuration issues and tracking through resolution.
Act as a point of escalation for junior level Engineers and provide guidance and mentoring.
Advise best practice on SIEM/MDR/SOAR products to both technical and relatively non-technical personnel.
Provide remote consulting services via interactive client sessions to assist with implementation of multiple product vendors and technologies.
Implement and configure SIEM/MDR/SOAR software and appliance-based products in large enterprise and Government environments.
Develop and maintain security content and reporting.
Perform knowledge transfers to clients regarding security and system configuration awareness.
Requirements
4-7 years professional experience maintaining SIEM or infrastructure systems in the Information Security field.
Minimum 18-months hands-on experience in Google Sec Ops.
College degree or equivalent training with experience working in a Security Operations Center, Managed Security, or client network environment.
Understanding of network architecture and implementation is a must; ideal candidate will have worked with network security analysis.
Excellent time management, reporting, and communication skills.
Experience working with Internal and client Ticketing and Knowledge Base Systems for Incident and Problem tracking as well as procedures. (i.e. Jira, Confluence, etc.).
Experience with various SIEM security products such as: Exabeam, Chronicle, Sentinel, LogRhythm, QRadar, Splunk, and infrastructure components such as proxies, firewalls, IDS/IPS, DLP etc.
General security knowledge (GIAC, CISSP, CCSE, CISA, HBSS, NSA, CEH, Cisco Security, Security +, or other security certifications).
Knowledge of Linux and Windows Operating Systems.
An understanding of a wide array of server grade applications such as: DBMS, Exchange, DNS, SMTP, IIS, Apache, SharePoint, Active Directory, Identity Management, Patch Management, LDAP, SQL, and others.
Training and experience in one or more non-SIEM network security products to include: Enterprise endpoint security products, Network components such as Firewalls and Proxies to include Palo Alto / Checkpoint / Juniper / McAfee / Cisco / Blue Coat / Imperva or other similar network security products.
CCNA, CCDA, CCSA, CCIE, CISSP, CEH, or MCSE.
Familiarity with DevOps
Professional experience working with networks and network architecture.
Ability to participate in on-call support
Demonstrated experience and success in a Managed Service client environment.
Ability to work greater than 40 hours per week as needed.
Benefits
Work/life balance
Professional training resources
Creative problem-solving and the ability to tackle unique, complex projects
Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities.
The ability and technology necessary to productively work remotely/from home (where applicable)
Cybersecurity Operations Analyst developing, implementing, and supporting security program at PCL Constructors. Engage in incident response, security operations, and compliance efforts.
Security Operations Center Specialist responsible for managing cybersecurity incidents at an international iGaming company. Engaging in threat analyses, security assessments, and incident response operations.
Junior Cyber Defender (SOC Analyst) work on detection and response at Ontinue, an AI - powered security company. Collaborating with teams on investigations and internal process improvements in Canada.
Senior Security Operations Engineer managing security for cloud - native environments at an AI research company. Focus on automation, compliance, and operationalizing security tools across platforms.
Security Operations Manager managing cloud security and identity governance at Cohere. Leading a high - performing security team and executing on strategic business goals.
Senior SOC Analyst at Absolute Security responsible for threat monitoring, hunting, and incident response. Utilizing CrowdStrike Falcon and Microsoft Sentinel to secure enterprise assets against advanced threats.
Corporate Security Operations Lead managing security operations for Carbon60 in a hybrid environment. Involves monitoring, incident response, and security controls across cloud and internal systems.